Selective Encryption Scheme for Vector Map Data using Chaotic Map

With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents the selective encryption scheme using hybrid transform for GIS vector map data protection to store, transmit or distribute to authorized users. In proposed scheme, polylines and polygons in vector map are targets of selective encryption. We select the significant objects in polyline/polygon layer, and then they are encrypted by the key sets generated by using Chaotic map before changing them in DWT, DFT domain. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

[1]  Fuguang Ma,et al.  The fine-grained security access control of spatial data , 2010, 2010 18th International Conference on Geoinformatics.

[2]  Michael Gertz,et al.  Security and privacy for geospatial data: concepts and research directions , 2008, SPRINGL '08.

[3]  Michael F. Goodchild,et al.  Twenty years of progress: GIScience in 2010 , 2010, J. Spatial Inf. Sci..

[4]  Suk-Hwan Lee,et al.  Effective Compression Technique for Secure Transmission and Storage of GIS Digital Map , 2011 .

[5]  A. Li,et al.  AUTHENTICATION OF GIS VECTOR DATA BASED ON ZERO-WATERMARKING , 2008 .

[6]  Elisa Bertino,et al.  A Controlled Access to Spatial Data on Web , 2004 .

[7]  O.I. Zhukovsky,et al.  Access to the Spatial Data in the Web-Oriented GIS , 2007, 2007 Siberian Conference on Control and Communications.

[8]  Wen-Wei Lin,et al.  Randomness Enhancement Using Digitalized Modified Logistic Map , 2010, IEEE Transactions on Circuits and Systems II: Express Briefs.

[9]  Weihong Cui,et al.  A Compound Chaos-Based Encryption Algorithm for Vector Geographic Data under Network Circumstance , 2008, 2008 Congress on Image and Signal Processing.

[10]  Naphtali Rishe,et al.  A web-based spatial data access system using semantic R-trees , 2004, Inf. Sci..

[11]  Shu-Ming Chang,et al.  Asymptotic synchronization of modified logistic hyper-chaotic systems and its applications , 2009 .

[12]  Zhengjun Liu,et al.  Double image encryption by using iterative random binary encoding in gyrator domains. , 2010, Optics express.